Article View: alt.privacy
Article #3459Re: NSA CAN BREAK PGP ENCRYPTION, what is PGP ??
From: ratinox@ccs.neu.
Date: Fri, 03 Dec 1993 19:37
Date: Fri, 03 Dec 1993 19:37
124 lines
6425 bytes
6425 bytes
>>>>> In article <3DEC199309331349@elroy.uh.edu>, st1r8@elroy.uh.edu >>>>> (B.J. Guillot) writes: st1r8> In article <RATINOX.93Dec2171655@atlas.ccs.neu.edu>, ratinox@atlas.ccs.neu.edu (Richard Pieri) writes... >> The NSA cannot crack PGP. Correction: the NSA /could/ crack PGP given >> several Crays dedicated to the task for 10 years (give or take a couple). >> But they can't crack it in a "reasonable" timeframe. st1r8> How about someone explaining why PGP is such a great and unbreakable st1r8> code? No cypher is unbreakable. It's just that PGP is so extremely difficult and time consuming to try to break that it isn't worth it. Anyhow, my own couple of bits on PGP: PGP === PGP is a "public key" encryption system. Encryption is the science of encoding information in such a way that it's impossible (or at least as difficult as possible) to see the information unless you have the appropriate key. Most encryption systems in use today are "single key" systems; that is, a single key is used to both encrypt and decrypt information. The flaw in single-key systems is that a secure means of distributing keys is required: if anyone discovers the key, anything encrypted with that key can be easilly seen. Of course, if you have a truely secure means of distributing the key, then why do you need a cryptosystem? This is something the gummint tends to ignore. BTW, the Federal DES and the European IDEA cyphers are examples of single-key cryptosystems. Public key cryptosystems use a different method of cryptography--they use two keys instead of just one. "Cleartext" (the unencrypted information) is encrypted with one of the keys. But this key will not decrypt the "cyphertext" (the encrypted information); but the other key in the key pair will. Anything encrypted with one key can be decrypted with the other. One of the keys in a public key pair is called the "public key" and the other is called the "secret key." By distributing your public key, anyone can use it to encrypt message meant for you, messages that can only be decrypted with your secret key. Unlike single-key systems, public key does not require a secure means for exchange of keys, making it that much more secure. PGP, Pretty Good Privacy, uses a combination of the Rivest-Shamir-Adleman (RSA) public key algorithm and the International Data Encryption Algorithm (IDEA), both of which have, to date, resisted all forms of cryptanalitical attacks. It should be noted that use of the Federal Data Encryption Standard (DES) is encouraged by the NSA for corporate use, but not for classified information--makes you wonder, doesn't it? Why would you want encryption? According to the gummint, you must have something illegal to hide if you do. Well, everyone and their brother uses envelopes to send mail through the Postal Service, right? Why? Privacy. Everyone wants their privacy, and that's what PGP provides. There is nothing illegal about it. But the gummint wants it that way. That's true. Last year, the FBI attempted to pass a bill through Congress that would require trap doors be placed in communication systems (the phone company primarily) so that government angencies with warrants could easilly tap in. Fortunately, it failed because manufacturers didn't want to pay the costs to add the equipment, and Libertarians balked at the privacy issues. The new "Clipper Chip" the gummint is now pressing uses a two-key cryptosystem similar to PGP. So will the Internet Privacy Enhanced Mail (PEM) package. The problem with these systems is that the gummint or a government assigned agency will hold all keys in escrow, so that they can decrypt messages whenever they want. This is something that Libertarians like myself are against. Which is why we use PGP. If you're still interested in PGP, it is available from many FTP sites around the world: Finland: nic.funet.fi (128.214.6.100) Directory: /pub/unix/security/crypt/ Italy: ghost.dsi.unimi.it (149.132.2.1) Directory: /pub/security/ UK: src.doc.ic.ac.uk Directory: /computing/security/software/PGP It runs on Unix, VAX/VMS, MS-DOS, Atari ST, Amiga, Macintosh, and can be ported to run on just about anything. The current version is 2.3A, and is available as source, and binaries for MS-DOS are available. The documentation goes into more depth about cryptography, and specifically how PGP functions. As Arlo Guthrie put it: You know, if one person, just one person does it they may think he's really sick and won't take him. And if two people, two people do it, in harmony, they may think they're both faggots and they won't take either of them. And three people, three, can you imagine, three people walking in sing a bar of Alice's Restaurant and walking out. They may think it's an organization. And can you imagine fifty people a day, I said fifty people a day walking in sing a bar of Alice's Restaurant and walking out. And friends they may thinks it's a movement. rat-pgp.el ========== rat-pgp.el is a GNU Emacs interface to the PGP public key system. It lets you easilly encrypt and decrypt message, sign messages with your secret key (to prove that it really came from you). It does signature verification, and it provides a number of other functions. The package is growing steadily as more is added. It is my intention that it will eventually allow as much functionality as accessing PGP directly. rat-pgp.el is about to undergo a complete re-write that will dramatically increase it's functionality. Watch my .sig for further information. The most recent version of rat-pgp.el is always available via anonymous FTP at ftp.ccs.neu.edu, directory /pub/ratinox/emacs-lisp/rat-pgp.el. -- Rat <ratinox@ccs.neu.edu> Northeastern's Stainless Steel Rat PGP 2.x Public Key Block available upon request GAT d@ -p+ c++ !l u+ e+(*) m-(+) s n---(+) h-- f !g(+) w+ t- r+ y+ ||| | | | | | | | | | | | | | | | | | | | | | | ||| `PGP,' warns Dorothy Denning, a Georgetown University professor who has worked closely with the National Security Agency, `could potentially become a widespread problem.' --E. Dexheimer
Message-ID:
<RATINOX.93Dec3143718@orodruin.ccs.neu.edu>
Path:
rocksolid-us.pugleaf.net!archive.newsdeef.eu!mbox2nntp-talk.rumors.mbox.zip!gmd.de!newsserver.jvnc.net!howland.reston.ans.net!europa.eng.gtefsd.com!uhog.mit.edu!grapevine.lcs.mit.edu!lynx!usenet
References:
<064303Z02121993@anon.penet.fi> <RATINOX.93Dec2171655@atlas.ccs.neu.edu> <3DEC199309331349@elroy.uh.edu>